1. Which of the following is NOT a key module of cloud security?
A) Data Encryption
B) Network as a Service
C) Identity and Access Management
D) Network Security
2. Which type of decentralization refers to the number of physical
computers in a system?
A) Logical
B) Data Encryption
C) Architectural
D) Political
3. In mobile cloud computing, which of the following is NOT considered
an issue?
A) Dependence on network bandwidth
B) Improved reliability and availability
C) Handling intermittent disconnections
D) Service unavailability when offline
4. Which of the following is NOT a factor influencing placement of
computation across the cloud-edge continuum?
A) Data volume
B) Latency requirements
C) Response time
D) Cost considerations
5. Which of the following is NOT a challenge in securing IaaS?
A) Limited control over infrastructure
B) API security
C) Shared responsibility model
D) Vulnerability management
6. Which MapReduce component prepares input for map by selecting a
key?
A) Map
B) Reduce
C) Shuffle
D) Client
7. Which of the following does NOT describe characteristics of effective
data pipelines?
A) Extensible based on standards
B) Scalable performance
C) Portable across different platforms
D) Support for both batch and stream processing
8. Which of the following is NOT a key feature of HDFS?
A) Supports high streaming read performance
B) High insertion performance
C) Follows write once and read many times concept
D) Abstracts network complexity
9. Which of the following is NOT a component of YARN?
A) Job Tracker
B) Node Manager
C) Resource Manager
D) Client
10. Which of the following is NOT a challenge in securing PaaS?
A) Limited control over infrastructure
B) Vendor lock-in concerns
C) Vendor lock-in advantages
D) Data security and compliance
11. Which of the following is NOT a disadvantage of cloud storage?
A) Portability
B) Reliance on network connection
C) Cheaper than physical storage
D) Security concerns
12. Which of the following is NOT an advantage of Apache Pig?
A) Built-in operators
B) Optimization opportunities
C) Ease of programming
D) Complex programming
13. Which of the following is NOT a use case of Apache Pig?
A) Applications
B) Data visualization
C) Research
D) Data scientists
14. Which of the following is NOT a challenge in securing SaaS?
A) Customization limitations
B) Integration with on-premises systems
C) Data residency and compliance
D) Custom installation process
15. Which of the following is NOT an API security best practice?
A) Encryption during transit
B) Abuse protection
C) Secure authentication
D) Input data validation
16. Which of the following is NOT a component of HDFS?
A) Client
B) Container
C) DataNodes
D) NameNode
17. Which of the following is NOT a module of Hadoop?
A) Pig
B) Hadoop Common
C) HDFS
D) MapReduce
18. Which of the following is NOT a main component of YARN?
A) Job Tracker
B) Resource Manager
C) Node Manager
D) Client
19. Which type of offloading is where specific parts are always executed
on the cloud?
A) Static offloading
B) Hybrid offloading
C) Edge offloading
D) Dynamic offloading
20. Which of the following is NOT a reason for increased use of mobile
devices?
A) Outperform PCs
B) Rapid iterations
C) Functional diversity
D) Reduced functionality over time
21. Which of the following is NOT an issue of mobile cloud computing?
A) Intermittent disconnections
B) Improved reliability
C) Dependence on network bandwidth
D) Service unavailability offline
22. Which of the following is NOT a key feature of ZooKeeper?
A) Metadata storage
B) Synchronization
C) Configuration maintenance
D) Distributed coordination service
23. Which of the following is NOT a deployment option for Apache
Spark?
A) Kubernetes
B) Hadoop YARN
C) Standalone deploy mode
D) Hive
24. Which of the following is NOT a reason for using Hadoop?
A) Interactive queries
B) Low cost solution
C) Massive data processing
D) Easily scalable
Answer Sheet
1. B
2. C
3. B
4. C
5. A
6. B
7. C
8. B
9. A
10. C
11. A
12. D
13. B
14. D
15. A
16. B
17. A
18. A
19. A
20. D
21. B
22. A
23. D
24. A